Linux Light Bulbs: Enabling Internet Protocol Connectivity for Light Bulb Networks

Size: px
Start display at page:

Download "Linux Light Bulbs: Enabling Internet Protocol Connectivity for Light Bulb Networks"

Transcription

1 Linux Light Bulbs: Enabling Internet Protocol Connectivity for Light Bulb Networks ABSTRACT Stefan Schmid Disney Research & ETH Zurich 86 Zurich, Switzerland Stefan Mangold Disney Research Zurich 86 Zurich, Switzerland Modern light bulbs based on Light Emitting Diodes (LEDs) can be used to create smart indoor environments: LED light bulbs provide a foundation for networking using visible light as communication medium. With Visible Light Communication (VLC), LED light bulbs installed in a room can communicate with each other and other VLC devices (e.g., toys, wearables, clothing). The vision of the Internet of Things requires that light bulbs and VLC devices communicate via the Internet Protocol (IP). This paper explores how the IP stack and other networking protocols can be hosted on Linux-based VLC devices. The VLC link layer for Linux consists of a VLC network driver module on top of a previously developed VLC Medium Access Control (MAC) and Physical (PHY) layers. The network driver provides the necessary interfaces to couple the IP networking protocols and the VLC layers. Performance and interaction between network driver and the existing MAC and PHY layers are analyzed and evaluated for different networking topologies and scenarios. The evaluation results suggest that the selected IP stack and the proposed VLC protocols are flexible enough to inter-operate. Categories and Subject Descriptors C.2 [Computer-Communication Networks]: Network Architecture and Design Wireless Communications Keywords Visible Light Communication; Free-Space Optics; Smart Light Bulbs; TCP/IP Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. VLCS 15, September 11, 215, Paris, France. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN /15/9...$15.. DOI: Theodoros Bourchas Disney Research & ETH Zurich 86 Zurich, Switzerland bourchast@gmail.com Thomas R. Gross ETH Zurich 892 Zurich, Switzerland thomas.gross@inf.ethz.ch Figure 1: c Disney, concept art: VLC devices and LED light bulbs communicating with each other. 1. INTRODUCTION Visible Light Communication (VLC) based on Light Emitting Diodes (LEDs) has several attractive properties, and recently developed LED-based light bulbs provide a costeffective path to bring VLC to every room. But so far, the endpoints in VLC networks often use a simple protocol that is appropriate for the Medium Access Control (MAC) and Physical (PHY) layers but does not directly support networking. As the nodes in a VLC network are required to communicate with nodes in the Internet, a necessary condition for the Internet of Things (IoT), the Internet Protocol (IP) stack must be supported. Also, when bringing the VLC protocols together with an IP stack, many already existing protocols for the IP layer and above can be reused without changes. This paper describes a prototype realization of an IPbased VLC system. The foundation is a communication firmware: a software-based VLC PHY layer and a listenbefore-talk VLC MAC layer protocol with contention executed on an 8-bit microcontroller [1, 2]. This software supports LED-to-LED VLC networks, where nodes communicate with each other over free-space optical line-of-sight channels, achieving a network throughput of up to 1 kb/s at distances of a few meters. Due to the limitations that single LEDs pose to the range of the communication, light bulb prototypes based on consumer LED light bulbs, integrating the aforementioned technology, have been developed [3]. LED light bulbs, with their wide presence in indoor envi-

2 ronments, can communicate with each other or with VLCenabled devices like smartphones, wearables, or toys. They can be used to broadcast beacons enabling indoor localization and can create smart lighting networks. The building blocks to devise a mesh network of light bulbs that route and forward network traffic through their VLC carrier interfaces are therefore available. This paper presents the following contributions: A hardware design of a Linux- and VLC-enabled light bulb: A consumer light bulb acts as a basis and is modified with additional electronics and casing. The hardware design is kept simple and low-cost (Section 2). A Linux kernel driver module integrating the VLC protocol s PHY and MAC layers into the Linux networking stack: The VLC firmware is kept on a separate microcontroller and communicates with the Linux platform over a serial interface (Section 3). An evaluation of the system for various network topologies: Traffic of the Internet Control Messaging Protocol (ICMP), the User Datagram Protocol (UDP), and the Transmission Control Protocol (TCP) are evaluated and analyzed (Section 4). 2. LIGHT BULB HARDWARE DESIGN This section describes the modification of the previously introduced VLC light bulb design [3]. Commercial off-theshelf LED light bulbs are used as a starting point and modified to host a System-on-a-Chip (SoC) running Linux, a VLC controller module, and an additional power supply for the added electronics. The system architecture is further explained in the following section. 2.1 System Architecture The VLC firmware and protocols [1,2] implement the PHY and MAC layers and enable low-level networking between multiple devices. To make use of higher level network protocols, the VLC controller is extended with a SoC running a Linux distribution for embedded wireless systems [4]. Figure 2 shows the overall system architecture. The microcontroller running the VLC firmware is connected via the Universal Asynchronous Receiver Transmitter (UART) interface to the SoC. On the Linux side, the VLC controller is abstracted as a regular Ethernet interface, implemented as a kernel driver module. Therefore most applications using TCP or UDP sockets will work out of the box and can make use of the VLC link. Since the VLC firmware is real-time critical, it is kept on a dedicated device, in the same way as Wi-Fi modules or any other networking devices. Another approach is to implement the VLC protocols directly on top of Linux using General-purpose Input/Output (GPIO) [5]. However, such a system works only as long as the operating system workload is kept low; as soon as the Linux host is used for other tasks (which motivated the addition of an operating system to VLC), timings might deviate and consequently influence the behavior of the VLC layers. 2.2 System Components The system is built from parts of the original light bulb and additional custom-built parts, circuitry and casing. In the following the most important parts are discussed: LED Atheros SoC AR9331 OpenWrt MCU ATmega328p VLC firmware Sensors LEDs Figure 2: Light bulb architecture: (1) Wi-Fi-enabled SoC module, (2) communication interface between SoC and MCU (UART), (3) MCU running VLC firmware, (4) photodiodes and signal amplification, (5) LED plate. plate, power supply, sensors and amplification circuitry, VLC controller, SoC board, and casing LED Plate The LED plate included in the original light bulb is reused together with the diffuse bulb that is covering the LEDs. It distributes the light in all the directions and therefore makes it possible to send data to devices all around and not only in a single direction. This diffuse bulb also distributes the light intensity in every direction and makes receiving a clean signal at a distance of several meters challenging (see light sensor section). Furthermore, a heat sink is attached to the LED plate, since the LEDs produce not negligible heat when powered on. The original light bulb uses the socket as a heat sink, but since the LED plate was moved to a different location, it needs to be cooled differently Power Supply The bulb built-in power supply outputs around 4 V DC (when loaded) and is used to power on the sixteen LEDs placed in series. It is dimensioned so that it provides just enough current for the LEDs. Therefore another power supply is needed for the additional electronics (VLC and SoC board). Figure 3 (1) shows the employed power supply, consisting of a grid voltage to 9 V AC/DC converter with a custom-built board attached to the bottom. The attached board hosts a voltage regulator providing a low-ripple 3.3 V source providing power for the additional electronics. The low-ripple source is specifically important for the analog amplification circuitry (see sensor section) Light Sensors and Amplification Circuit Every light bulb is equipped with four photodiodes (Osram SFH213) to sense incoming light from every direction. The incoming signal is DC filtered and amplified. Every photodiode is connected to its own amplifier to keep paths on the board as short as possible and the signal therefore less prone to noise and interference. The amplified signals are fed into the ADC inputs of the VLC controller where they are further processed. Figure 3 (3) shows the PCB. The sensors connect to (3a) respectively to the foreseen locations in the other corners of the PCB. The pin headers (3c) build the socket for the VLC controller described in the next section VLC Controller The VLC PHY and MAC layers [1, 2, 6] are softwarebased and hosted on an 8-bit Atmel microcontroller (ATmega 328p). The microcontroller board connects directly to the amplification PCB. Since the four sensors are individually sensing the incoming light, the VLC firmware can also

3 Figure 3: (1) Power supply for electronics with regulator (1a) for low-ripple voltage; (2) SoC (2c) breakout board with connectors to VLC controller board (2a), to the power supply (2b), and to the LEDs (2d); (3) VLC controller and sensor board with connector for sensors (3a), connector to the SoC host board (3b) and pin headers (3c) to mount the VLC microcontroller. Figure 4: (1) Bottom casing hosting the additional power supply (1c), the light sensors (2b) the VLC controller board (1a) and the SoC board; (2) the top casing housing the LED heat sink (2b) and LEDs (2a), further providing additional air flow through slits (2c); (3) original light bulb socket with integrated power supply for the LEDs. provide information about the originating direction of the signal. The controller uses the serial (UART) interface to communicate with the SoC board running Linux SoC Board Each light bulb features a SoC. The module consists of an Atheros (AR9331) SoC with built-in 82.11g/n Wi-Fi including an on-board antenna. It also provides 2 GPIO pins and a serial interface (UART). The SoC can run OpenWrt [4], an embedded Linux distribution specifically for routers and other networking devices. Since it is a Linux distribution it ships with the entire Linux network stack, providing a complete network- and transport-layer for VLC. A Linux kernel driver module (further explained in the next section) interfaces with the VLC controller and the Linux network stack. The Wi-Fi interface provided by the SoC is very useful for a testbed environment. The wireless radio channel can be used as a control channel. The devices can be deployed and later configured and reprogrammed remotely. Also, measurements can be started and data can be collected without removing the bulbs again. It is important to know that the objective was not to built light bulbs that interconnect using Wi-Fi. The light bulbs interact with each other using VLC only. Further, it is possible to use the SoC as a programmer for the VLC controller. This means that a new firmware image can be transferred wirelessly to the bulb and then flashed to the controller. Figure 3 (2) shows the board hosting SoC from both sides. (2c) shows the SoC and (2a,b,d) depict different connectors going to the sensor and VLC controller board, to the power supplies, and LEDs Casing The off-the-shelf light bulbs are tightly packed. To create additional space for the modifications, 3D-printed casings are added to the bulb socket providing room for all the electronics. Figure 4 shows the different parts. The bottom part (1) hosts the power supply (1c), sensors (1b), VLC controller board (1a), and on the top the SoC module. It can be screwed directly to the bulb socket (3). On top sits an additional part (2), containing the LED plate (2a) and the heat sink (2b). Additional slits (2c) provide improved air flow. The diffuse bulb is screwed on top of the LED plate Figure 5: Fully assembled VLC-enabled light bulb. and held in place by a 3D-printed thread. Figure 5 shows the assembled light bulb. 3. LINUX INTEGRATION The transparent integration of the VLC communication channel based on the software-defined VLC firmware into the Linux networking stack demands the implementation of a VLC-enabled data link layer. As illustrated in Figure 6, the VLC data link layer consists of three core functional blocks: (1) VLC network driver, (2) VLC firmware MAC protocol, and (3) VLC-UART interface, which interconnects the two aforementioned blocks through UART. In this section, we describe the design and implementation features of the Linux-based VLC network driver. 3.1 Design Considerations The VLC network driver resides in the kernel space of OpenWrt with root execution privileges. It controls data transfer within the CPU, and handles asynchronous interrupts triggered either by the network device (VLC firmware) through the UART interface or by the higher levels of Linux network stack. It is designed as a loadable kernel module. The VLC network driver deals with making the MAC layer of the VLC library available to the network protocol suite of OpenWrt, by exposing a VLC-enabled Ethernetclass network interface, which is in charge of sending and receiving data packets. The network interface registers itself within specific kernel data structures, to be invoked when packets are exchanged with the outside world. It responds to asynchronous requests received from the outside (incoming packets from the VLC library), as well as to requests triggered by the kernel for outgoing packets to the

4 Physical Layer VLC Firmware Atmega 328p VLC Firmware Data Link Layer OpenWrt AR9331 SOC Linux Network Stack VLC Network Driver Linux Network Stack net_device sk_buff VLC Network Driver st Hop 2 nd Hop N th Hop Sender Receiver Sender Receiver Direct Link VLC-UART Interface MAC Layer VLC UART API UART RX/TX PHY Layer UART TX/RX VLC UART API Visible Light MAC Layer Figure 6: VLC Data Link Layer: VLC network driver, VLC- UART interface, and MAC layer (left). Linux Network Stack interaction with driver and VLC controller is shown on the right. MAC/PHY layers, without knowing how individual transactions mapped to the actual packets are being transferred. A core part of the VLC network driver s functionality is the communication of the VLC firmware through the VLC- UART interface. The serial interface is the communication channel between the SoC that hosts the network driver and the microcontroller where the VLC PHY/MAC layers are implemented. It must be ensured that both, the network driver and the VLC firmware, exchange data packets that are compatible with the format that the other end expects to receive. 3.2 Driver Implementation The interface of the VLC network driver to the Linux network stack consists of two functional blocks, which are inherent in every Linux-based network driver; the net_device and the sk_buff data structures. The net_device represents the driver module in the upper layers. It is used to initialize and disable the network device, and through this structure a number of device parameters can be set and initialized. Among others, the interrupt number (IRQ) that is mapped to the device is specified, the hardware address and the name of the network interface as it is exposed to user space is set, and a number of operations on the network device are enabled. The sk_buff represents the network packet that arrives from the upper networking layers. The serial communication on the side of the network driver is controlled by means of an interrupt handler. When there is a new data packet (sk_buff) in the transmission queue of the driver, a job to forward the packet content over UART to the VLC controller is scheduled and is executed immediately when the processor is available (outside the interrupt context). If the VLC controller is not available to receive, due to concurrently running tasks of the VLC firmware, the data is scheduled to be transmitted later. On the other side, during reception, a data packet is received through consecutive interrupts and pushed to the network stack, wrapped in a sk_buff structure. 4. EVALUATION The performance of the data link layer was evaluated with a single LED as transmitter and receiver. The described light bulbs have been measured to produce better results, also for larger communication ranges, due to the fact of Figure 7: (1) Direct link topology; (2) multi-hop topology, N intermediate nodes between sender and receiver. higher emitted light intensity and the addition of a photodiode with amplification circuit. Therefore results of the same quality if not better are to be expected. The evaluation section consists of measurements for direct link and multi-hop topologies and different types of network traffic (ICMP, UDP, TCP). 4.1 Direct Link and Multi-hop Topology In networking terminology, the term hop refers to the number of intermediate nodes a data packet passes through. The diagram in Figure 7 (2), shows a path with N hops: in a multi-hop topology, N + 2 nodes participate, one is the transmitter, one is the receiver, and any data packet sent from the transmitter to the receiver must hop over N intermediate nodes. In a direct link topology, only two nodes participate without any hop in between (Figure 7 (1)). 4.2 ICMP Network Traffic ICMP network traffic is used to measure the Round Trip Time (RTT) of a network packet between a sender and a destination node. In Figure 8 (1), the RTT is evaluated for different ICMP packet payloads and for different distances. It is shown that for distances up to 13 cm and for the same ICMP packet payload, the RTT has the same value but shows high deviations for distances larger than 13 cm. With the LED-to-LED setup, the transmission range is limited to 13 cm, and for larger distances, the two VLC-enabled platforms cannot communicate at all, making the RTT infinite. Therefore RTT for distances larger than 14 cm is not shown. Measurements are also reported for 1-hop and 2-hop topologies (Figure 8 (2)). As expected, the RTT for multi-hop topologies is significantly higher and the larger the packet payload, the longer the RTT. All measurements were conducted without a Request to Send/Clear to Send (RTS/CTS) scheme enabled, since there will be always only one packet in transit. This scheme is a commonly used technique in wireless networks to anticipate the problem of hidden stations. It is also worth mentioning that the maximum VLC payload that can be transmitted is 2 byte, due to memory limitations and low symbol rate of the VLC controller platform. 4.3 UDP Network Traffic This section describes measurement for UDP datagram traffic. Experiments for different UDP packet sizes, communication distances and network topologies are reported. Figure 8 (3) shows that the UDP protocol overhead limits the overall throughput, and this effect is more pronounced

5 1 6 5 ICMP Payload = 158 Byte / VLC Payload = 2 Byte ICMP Payload = 18 Byte / VLC Payload = 15 Byte ICMP Payload = 58 Byte / VLC Payload = 1 Byte ICMP Payload = 18 Byte / VLC Payload = 6 Byte hop/ End to End Link = 3cm (1cm/link) 1 hop/ End to End Link = 2cm (1cm/link) Direct Link (1 cm) Round Trip Time (s) Round Trip Time (s) /6 58/1 18/15 158/2 ICMP/VLC Payload (Byte) UDP Payload = 158 Byte 9 UDP Payload = 18 Byte UDP Payload = 58 Byte 8 UDP Payload = 18 Byte UDP Network Traffic Static TCP Sender Window = 134 Byte 6 9 Static TCP Sender Window = 84 Byte 8 Static TCP Sender Window = 34 Byte UDP Network Traffic Direct Link (1 cm) 1 hop/ End to End Link = 2cm (1cm/link) 2 hop/ End to End Link = 3cm (1cm/link) Solid Line: RTS/CTS OFF Dashed Line: RTS/CTS ON 18/6 58/1 18/15 158/2 UDP/VLC Payload (Byte) Direct Link (1 cm) 1 hop/ End to End Link = 2cm (1cm/link) 2 hop/ End to End Link = 3cm (1cm/link) Solid Line: RTS/CTS OFF Dashed Line: RTS/CTS ON /1 84/15 134/2 TCP Sender Static Window Size (Byte) 7 1 TCP Byte Stream = 134 Byte 8 9 TCP Byte Stream = 84 Byte 8 TCP Byte Stream = 34 Byte Direct Link (1 cm) 1 hop/ End to End Link = 2cm (1cm/link) 2 hop/ End to End Link = 3cm (1cm/link) Solid Line: RTS/CTS OFF Dashed Line: RTS/CTS ON TCP Byte Stream (Byte) Figure 8: Result graphs for ICMP (1-2), UDP (3-4) and TCP (5-8) measurements.

6 for small payloads. The throughput drop at 13 cm shows again the limited communication range. Figure 8 (4) shows UDP traffic for multi-hop scenarios. As it is expected, RTS/CTS in direct link topologies adds more delay and decreases throughput. In 1-hop and 2-hop topologies, a small improvement in the performance with enabled RTS/CTS is visible. Despite the fact that UDP traffic inserts only one packet stream in the network and traffic moves only in one direction at a time, collisions seem to happen and RTS/CTS is reducing the packet collision probability. 4.4 TCP Traffic Given the bottleneck imposed by the speed of the VLC link, the TCP parameters are examined and adjusted so that they correspond to the capabilities of the VLC link layer. In particular, the policy concerning the TCP sender window is examined for direct link and multi-hop network scenarios. The TCP sender window defines the number of bytes the transport layer can inject into the network layer without having received any acknowledgment (ACK). The sender window size is modified and the network performance is evaluated with respect to the resulting TCP throughput. The main limitation comes from the VLC library, as it cannot handle packets larger than 2 byte. This limitation restricts TCP s Maximum Segment Size (MSS) to 134 byte (2 byte minus the TCP header size). In addition, to limit complexity, a TCP policy is applied so that there is only one TCP stream between two nodes, and only one network packet is in transit in the network at any given moment (TCP window size of one). Figure 8 (5) shows that larger TCP sender window sizes lead to higher TCP throughput up to the communication range of 13 cm. Figure 8 (6) shows TCP throughput with a static TCP window, measured for the direct link, 1-hop, and 2-hop topologies. It can be observed that even in multi-hop topologies, the use of RTS/CTS decreases the TCP throughput and this is more eminent when using a larger sender window. This effect is due to the specific nature of the static TCP window and the specific scenario of one TCP stream. Despite the multi-hop topologies, the end-to-end connection keeps the sender waiting for an ACK for every TCP segment transmitted and only then proceeds to the next transmission. Thus, there are no collisions and RTS/CTS adds more delay, decreasing the throughput. For other scenarios, where multiple streams are involved, the use of RTS/CTS is highly recommended. Since this scenario is not very likely for light bulb mesh networks, also experiments with a dynamic TCP setup are reported. Given the maximum of 134 byte MSS that the VLC library imposes, with a dynamic TCP sender window, we inject multiple TCP segments in the VLC network driver buffer. The network performance for different sizes of TCP streams using a dynamic TCP window in a direct link topology is depicted in Figure 8 (7). As expected, in a direct link with a dynamic TCP sender window, the TCP throughput is between 38-4 b/s, almost the same performance as in the scenario with a static TCP window size of 134 byte. Figure 8 (8) depicts network performance for multi-hop topologies using a dynamic TCP sender window. Without RTS/CTS there is no mechanism to detect simultaneous transmissions from hidden stations and thus consequently larger delays and lower throughputs are measured. Enabling RTS/CTS decreases the TCP throughput in the direct link topology, while in multi-hop topologies a slight improvement in the network performance is visible. 5. CONCLUSIONS IP multi-hop networking is an important feature for VLC, as it enables the communication between light bulbs and smart objects, without relying on additional radio technology (ZigBee, Wi-Fi, etc.). This paper describes how an IP stack can operate on an LED-based VLC node, using the OpenWRT light-weight variant of Linux. Endpoints can be light bulbs or other platforms that provide LED-based communication equipped with a compatible IP stack. The initial prototype has not been optimized for performance, and a number of important issues deserve further investigation, but the system provides a proof of concept that indeed the IP stack and the proposed VLC protocols are flexible enough to inter-operate. The ubiquitous presence of LED-based light bulbs that can be enhanced with VLC functionality, and the availability of low-complex LED-equipped devices that can engage in VLC, unleashes a wide range of opportunities and applications. As we are flooded with light everywhere, VLC-based localization services using the existing lighting infrastructure can be a viable alternative to alternative localization solutions based on radio signals. In addition, controllable LED lighting, identification, and indoor tracking opportunities can be grown using the dedicated VLC channel per light bulb. Communication with light enables a true Internet of Things, as consumer devices, such as toys equipped with LEDs, are transformed into interactive IP communication nodes an interesting low-complex feature for what we refer to as the Internet of Toys. 6. REFERENCES [1] S. Schmid, G. Corbellini, S. Mangold, and T. Gross, LED-to-LED Visible Light Communication Networks, in MobiHoc, 213 ACM, Aug [2] S. Schmid, G. Corbellini, S. Mangold, and T. Gross, Continuous Synchronization for LED-to-LED Visible Light Communication Networks, in Optical Wireless Communications (IWOW), 214 3rd International Workshop in, pp , Sept 214. [3] S. Schmid, J. Ziegler, G. Corbellini, T. R. Gross, and S. Mangold, Using Consumer LED Light Bulbs for Low-cost Visible Light Communication Systems, in Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, VLCS 14, pp. 9 14, ACM, 214. [4] OpenWrt, OpenWrt, May [5] Q. Wang, D. Giustiniano, and D. Puccinelli, OpenVLC: Software-defined Visible Light Embedded Networks, in Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, VLCS 14, pp. 15 2, ACM, 214. [6] S. Schmid, G. Corbellini, S. Mangold, and T. Gross, An LED-to-LED Visible Light Communication System with Software-based Synchronization, in Optical Wireless Communication. Globecom Workshops (GC Wkshps), 212 IEEE, pp , Dec. 212.

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Virtual KNX/EIB devices in IP networks

Virtual KNX/EIB devices in IP networks WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: info@weinzierl.de Web: www.weinzierl.de

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Internet of Things based approach to Agriculture Monitoring

Internet of Things based approach to Agriculture Monitoring Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator) Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:

More information

Figure 1.Block diagram of inventory management system using Proximity sensors.

Figure 1.Block diagram of inventory management system using Proximity sensors. Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Analysis of Open Source Drivers for IEEE 802.11 WLANs

Analysis of Open Source Drivers for IEEE 802.11 WLANs Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,

More information

RC2200DK Demonstration Kit User Manual

RC2200DK Demonstration Kit User Manual Demonstration Kit User Manual Table of contents TABLE OF CONTENTS... 1 QUICK INTRODUCTION... 2 INTRODUCTION... 3 DEMONSTRATION BOARD... 4 POWER SUPPLY SECTION... 5 RS-232 INTERFACE... 6 CONNECTORS... 7

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Operating Systems Design 16. Networking: Sockets

Operating Systems Design 16. Networking: Sockets Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski pxk@cs.rutgers.edu 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

FLYPORT Wi-Fi 802.11G

FLYPORT Wi-Fi 802.11G FLYPORT Wi-Fi 802.11G System on module 802.11g WIFI - Infrastructure mode - softap mode - Ad hoc mode Microchip PIC 24F 16 bit processor Microchip MRF24WG0MA/MB - Native WiFi 802.11g transceiver - PCB

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern

UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern Dez 19, 2011 Outline Introduction Related Work Mikrokopter

More information

The Elements of GigE Vision

The Elements of GigE Vision What Is? The standard was defined by a committee of the Automated Imaging Association (AIA). The committee included Basler AG and companies from all major product segments in the vision industry. The goal

More information

Implementation of a Wimedia UWB Media Access Controller

Implementation of a Wimedia UWB Media Access Controller Implementation of a Wimedia UWB Media Access Controller Hans-Joachim Gelke Institute of Embedded Systems Zurich University of Applied Sciences Technikumstrasse 20/22 CH-8401,Winterthur, Switzerland hans.gelke@zhaw.ch

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

System-on-a-Chip with Security Modules for Network Home Electric Appliances

System-on-a-Chip with Security Modules for Network Home Electric Appliances System-on-a-Chip with Security Modules for Network Home Electric Appliances V Hiroyuki Fujiyama (Manuscript received November 29, 2005) Home electric appliances connected to the Internet and other networks

More information

What is Network Latency and Why Does It Matter?

What is Network Latency and Why Does It Matter? What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

6LoWPAN: An Open IoT Networking Protocol

6LoWPAN: An Open IoT Networking Protocol 6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany kappes@docomolab-euro.com Keywords: IEEE

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck

Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

SIP Protocol as a Communication Bus to Control Embedded Devices

SIP Protocol as a Communication Bus to Control Embedded Devices 229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.

More information

NXU RoIP Link to Eliminate Voice-Grade Leased Line

NXU RoIP Link to Eliminate Voice-Grade Leased Line NXU RoIP Link to Eliminate Voice-Grade Leased Line Purpose This Application Note will describe a method at which Network Extension Units (NXUs) can be utilized on an existing digital network to eliminate

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

Short range low power wireless devices and Internet of Things (IoT)

Short range low power wireless devices and Internet of Things (IoT) Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Cell Phone Based Liquid Inventory Management Using Wireless System

Cell Phone Based Liquid Inventory Management Using Wireless System Sciknow Publications Ltd. JMIR 2013, 1(1):1-6 Journal of Mechanics & Industry Research DOI: 10.12966/JMIR.05.01.2013 Attribution 3.0 Unported (CC BY 3.0) Cell Phone Based Liquid Inventory Management Using

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Remote Serial over IP Introduction on serial connections via IP/Ethernet

Remote Serial over IP Introduction on serial connections via IP/Ethernet Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and

More information

ESP 8266: A BREAKTHROUGH IN WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS

ESP 8266: A BREAKTHROUGH IN WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 8, Aug 2015, pp. 07-11, Article ID: IJECET_06_08_002 Available online at http://www.iaeme.com/ijecetissues.asp?jtypeijecet&vtype=6&itype=8

More information